SlideShare a Scribd company logo
Certificates
X.509 Authentication Service

•   Distributed set of servers that maintains a database about
    users.

•   Each certificate contains the public key of a user and is signed
    with the private key of a CA.

•   Is used in S/MIME, IP Security, SSL/TLS and SET.


•   RSA is recommended to use.




                                                                       2



                            ET1318 - Network Security
3



ET1318 - Network Security
4



ET1318 - Network Security
Public-Key Certificate Use




                                   5



       ET1318 - Network Security
X.509 Formats




                             6



 ET1318 - Network Security
Obtaining a User’s Certificate

•   Characteristics of certificates generated by CA:

      Any user with access to the public key of the CA can recover the
       user public key that was certified.

      No part other than the CA can modify the certificate without this
       being detected.




                                                                           7



                             ET1318 - Network Security
Revocation of Certificates

•   Reasons for revocation:

     The users secret key is assumed to be compromised.
     The user is no longer certified by this CA.
     The CA’s certificate is assumed to be compromised.




                                                           8



                             ET1318 - Network Security
CA Hierarchy




                             9



 ET1318 - Network Security
Authentication Procedures




                                  10



      ET1318 - Network Security
Internet Key Exchange (IKE)

•   Protocol to manage keys in IPsec by negotiating security
    associations between a set of peers
•   Based on RFC 2409
•   Using a standard Diffie-Hellman exchange to obtain a shared secret
•   Also used to negotiate the encryption, authentication, and other
    cryptographic primitives that the VPN needs to create a SA

•   Derives from other key-exchange protocols
     Internet Security Association and Key Management Protocol - ISAKMP
     Oakley Key Determination protocol - Oakley
     SKEME




                                                                           11
IKE use in IPsec




                              12



  ET1318 - Network Security
IKE and IPSec in Cisco ISO




                                   13



       ET1318 - Network Security
ISAKMP

•   Defines procedures and packet formats to negotiate, establish,
    modify, and delete SAs
•   UDP or TCP port 500

•   Establishment of SAs by using ISAKMP are achieved in two phases
     1. Peers authenticate each others and establish a secure communication
        channel
     2. ISAKMP negotiates VPN SAs




                                                                              14



                              ET1318 - Network Security
ISAKMP Cookies

•   IKE’s goal is to prevent against DoS-attacks
•   An easy DoS attack against IKE could be to flood an IKE node with
    IKE packets with spoofed source address. Hence forcing the IKE
    node to do expensive, but useless, Diffie-Hellman calculations

•   ISAKMP uses cookies to identify the source before doing the
    expensive Diffie-Hellman calculation
•   The ISAKMP node sends a cookie that the receiver must bounce in
    order to start Diffie-Hellman key exchange




                                                                        15



                           ET1318 - Network Security
ISAKMP




                            16



ET1318 - Network Security
ISAKMP Payload Types

•   Key Exchange Payload
•   Certificate Payload (transfers a public key certificate)
•   Notification Payload (error messages)
•   Responder-Lifetime
•   Hash Payload
•   Signature Payload




                                                               17



                              ET1318 - Network Security
ISAKMP Payload Example




                                  18



      ET1318 - Network Security
Oakley

•   Three authentication methods:
     Digital signatures
     Public-key encryption
     Symmetric-key encryption




                                                       19



                           ET1318 - Network Security

More Related Content

PDF
Protegendo sua cloud
PPTX
Itn6 instructor materials_chapter1
PDF
Bloombase Spitfire Link Encryptor Server Brochure
PDF
Bloombase SpitfireOS Specifications
PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
PDF
SecurityRI Wifi Security / Secure your Network
PDF
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
PPTX
Ccna security
Protegendo sua cloud
Itn6 instructor materials_chapter1
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase SpitfireOS Specifications
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
SecurityRI Wifi Security / Secure your Network
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Ccna security

What's hot (20)

PDF
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
PPT
Asa sslvpn security
PDF
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
PDF
Departed Communications: Learn the ways to smash them!
PPTX
lmplementing Firewall Technologies
PDF
Hacking SIP Like a Boss!
PPTX
Developing an IoT System FIWARE Based from the Scratch
PPT
CCNA Security - Chapter 2
PDF
VoIP Wars: The Phreakers Awaken
PDF
Fortigate fortiwifi-80f-series
PDF
Maemo 6 Platform Security
DOC
Vikash_mani
PDF
Open ssl certificate (https) for hotspot mikrotik
PDF
z/OS Authorized Code Scanner
DOC
Network Engineer
PDF
DEFCON 23 - Fatih Ozavci - the art of voip workshop
PDF
CipherWire Networks - SafeNet KeySecure
PPT
CCNA Security 012- cryptographic systems
DOCX
Cisco asa 5500 series adaptive security appliances
PDF
02 ipv6-cpe-panel security
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Asa sslvpn security
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
Departed Communications: Learn the ways to smash them!
lmplementing Firewall Technologies
Hacking SIP Like a Boss!
Developing an IoT System FIWARE Based from the Scratch
CCNA Security - Chapter 2
VoIP Wars: The Phreakers Awaken
Fortigate fortiwifi-80f-series
Maemo 6 Platform Security
Vikash_mani
Open ssl certificate (https) for hotspot mikrotik
z/OS Authorized Code Scanner
Network Engineer
DEFCON 23 - Fatih Ozavci - the art of voip workshop
CipherWire Networks - SafeNet KeySecure
CCNA Security 012- cryptographic systems
Cisco asa 5500 series adaptive security appliances
02 ipv6-cpe-panel security
Ad

Viewers also liked (9)

PDF
Lecture malicious software
PPT
Lecture 11 wifi security
PPTX
Lecture 10 intruders
PPT
Lecture 5 ip security
PPT
Lecture 9 key distribution and user authentication
PDF
Malicious software
PPT
Lecture 12 malicious software
PPT
Lecture 4 firewalls
PPT
Lecture 6 web security
Lecture malicious software
Lecture 11 wifi security
Lecture 10 intruders
Lecture 5 ip security
Lecture 9 key distribution and user authentication
Malicious software
Lecture 12 malicious software
Lecture 4 firewalls
Lecture 6 web security
Ad

Similar to Lecture 7 certificates (20)

PDF
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
PPTX
crypto.pptx
PPTX
crypto.pptx
PPT
Phifer 3 30_04
PPTX
Cryptography and network security
PPTX
PPTX
Module 8 - Ccna - Pre.pptx
PDF
20 palo alto site to site
PPT
Information Security Lesson 9 - Keys - Eric Vanderburg
PPTX
cryptography.pptx
PPTX
Shanghai Breakout: Wireless LAN Security Fundamentals
PPTX
Wi-Fi Security Fundamentals
PPT
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
PDF
Using Hard Disk Encryption and Novell SecureLogin
PDF
Sullivan handshake proxying-ieee-sp_2014
PPT
PPT
SSL & TLS Architecture short
PPTX
IBM Secret Key management protoco
PPT
ch1 eriht eriotery erogyteip ergy7.ppt
PPT
chap17 computer and programming in cpp.ppt
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
crypto.pptx
crypto.pptx
Phifer 3 30_04
Cryptography and network security
Module 8 - Ccna - Pre.pptx
20 palo alto site to site
Information Security Lesson 9 - Keys - Eric Vanderburg
cryptography.pptx
Shanghai Breakout: Wireless LAN Security Fundamentals
Wi-Fi Security Fundamentals
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Using Hard Disk Encryption and Novell SecureLogin
Sullivan handshake proxying-ieee-sp_2014
SSL & TLS Architecture short
IBM Secret Key management protoco
ch1 eriht eriotery erogyteip ergy7.ppt
chap17 computer and programming in cpp.ppt

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Lecture 7 certificates

  • 2. X.509 Authentication Service • Distributed set of servers that maintains a database about users. • Each certificate contains the public key of a user and is signed with the private key of a CA. • Is used in S/MIME, IP Security, SSL/TLS and SET. • RSA is recommended to use. 2 ET1318 - Network Security
  • 5. Public-Key Certificate Use 5 ET1318 - Network Security
  • 6. X.509 Formats 6 ET1318 - Network Security
  • 7. Obtaining a User’s Certificate • Characteristics of certificates generated by CA:  Any user with access to the public key of the CA can recover the user public key that was certified.  No part other than the CA can modify the certificate without this being detected. 7 ET1318 - Network Security
  • 8. Revocation of Certificates • Reasons for revocation:  The users secret key is assumed to be compromised.  The user is no longer certified by this CA.  The CA’s certificate is assumed to be compromised. 8 ET1318 - Network Security
  • 9. CA Hierarchy 9 ET1318 - Network Security
  • 10. Authentication Procedures 10 ET1318 - Network Security
  • 11. Internet Key Exchange (IKE) • Protocol to manage keys in IPsec by negotiating security associations between a set of peers • Based on RFC 2409 • Using a standard Diffie-Hellman exchange to obtain a shared secret • Also used to negotiate the encryption, authentication, and other cryptographic primitives that the VPN needs to create a SA • Derives from other key-exchange protocols  Internet Security Association and Key Management Protocol - ISAKMP  Oakley Key Determination protocol - Oakley  SKEME 11
  • 12. IKE use in IPsec 12 ET1318 - Network Security
  • 13. IKE and IPSec in Cisco ISO 13 ET1318 - Network Security
  • 14. ISAKMP • Defines procedures and packet formats to negotiate, establish, modify, and delete SAs • UDP or TCP port 500 • Establishment of SAs by using ISAKMP are achieved in two phases 1. Peers authenticate each others and establish a secure communication channel 2. ISAKMP negotiates VPN SAs 14 ET1318 - Network Security
  • 15. ISAKMP Cookies • IKE’s goal is to prevent against DoS-attacks • An easy DoS attack against IKE could be to flood an IKE node with IKE packets with spoofed source address. Hence forcing the IKE node to do expensive, but useless, Diffie-Hellman calculations • ISAKMP uses cookies to identify the source before doing the expensive Diffie-Hellman calculation • The ISAKMP node sends a cookie that the receiver must bounce in order to start Diffie-Hellman key exchange 15 ET1318 - Network Security
  • 16. ISAKMP 16 ET1318 - Network Security
  • 17. ISAKMP Payload Types • Key Exchange Payload • Certificate Payload (transfers a public key certificate) • Notification Payload (error messages) • Responder-Lifetime • Hash Payload • Signature Payload 17 ET1318 - Network Security
  • 18. ISAKMP Payload Example 18 ET1318 - Network Security
  • 19. Oakley • Three authentication methods:  Digital signatures  Public-key encryption  Symmetric-key encryption 19 ET1318 - Network Security